HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN

DOWNLOAD EBOOK : HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN PDF

Click link bellow and free register to download ebook: HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN DOWNLOAD FROM OUR ONLINE LIBRARY

HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN PDF

Exactly how a suggestion can be got? By staring at the celebrities? By going to the sea and also checking out the sea weaves? Or by reading a publication How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken Everybody will certainly have particular unique to get the motivation. For you which are dying of books and consistently obtain the motivations from publications, it is really excellent to be below. We will certainly reveal you hundreds compilations of the book How Secure Is Your Wireless Network? Safeguarding Your WiFi LAN By Lee Barken to check out. If you similar to this How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken, you could also take it as all yours.

From the Back Cover Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user. Topics covered include-● ● ● ● ● ● ● ● ● ●

Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough

About the Author About the Author LEE BARKEN, CISSP, CCNA, MCP, CPA, has been in the IT industry since 1987. He has worked as anIT consultant and network security specialist for Ernst and Young's Information Technology

RiskManagement (ITRM) practice and KPMG's Risk and Advisory Services (RAS) practice. He cofoundedthe San Diego Wireless Users Group and writes and speaks on the topic of wireless LANtechnology and security. He is the technical editor for Mobile Business Advisor Magazine, andteaches Wireless LAN Security and Deployment classes for the University of California at SanDiego (UCSD) extension.

Excerpt. © Reprinted by permission. All rights reserved. Introduction How Secure is Your Wireless Network? is a book about taking the next step and securing yourwireless network. Announcements by major companies backing wireless technologies are settingthe stage for wide-scale deployments and the ushering in a new era of wireless freedom.Companies like Intel have announced the Centrino chipset that will integrate 802.11functionality into their products. Dell, Gateway, IBM and others have announced initiatives tointegrate wireless technology into their laptops. T-Mobile, Boingo, Wayport and dozens ofothers have deployed hotspots in Starbucks, Borders, and Kinkos locations as well as hotels,airports and other public venues across the world. Almost every University has deployed somekind of wireless initiatives, with high schools and elementary schools following in theirfootsteps. Millions of home users have discovered the joys of wireless networking. Nowbusinesses everywhere are getting on board as well. The bottom line is that wireless is here to stay. The integration of 802.11 into almost allnew laptops and handheld devices, coupled with the explosion in availability of public hotspotshas created a virtuous cycle of large-scale wireless proliferation. This invisible, yetinescapable flood of radio waves has landed squarely in our homes and businesses where itpresents a whole new security challenge. How do we embrace the joys of wireless networks whilewe maintain an essential balance with the security needs of our organization? This book is all about understanding the technology, recognizing the security risks andimplementing a responsible and realistic game plan for safe and secure wireless communication. Why I Wrote This Book Although I had seen many demonstrations of wireless networks, it wasn't until the summer of2001, that I found my true inspiration. At a large security conference, after listening tospeakers talk about community wireless networks, WLAN security and other wireless topics, Icame back home energized and decided it was time to put that spirit to work. A few weeks later,I started the San Diego Wireless Users Group with some friends and found my new passion inwireless technology. With the help of countless dedicated volunteers, including Alan Koebrick,John Eder, Eric Bermel, Michael Mee, and others, we hold monthly meetings with presentations ona variety of topics to share our passion for learning, meet likeminded wireless enthusiasts andhelp one other learn more about this wonderful technology. I've always enjoyed being a "tinkerer," eager to learn how things work.I was the kid who took apart the radio (or telephone, or video game) to check out the parts andunderstand how something operated. Wireless LANs were no different. Fundamentally, if you wantto develop a genuine appreciation for the security risks of wireless networks, you have to rollup your sleeves, get some wireless components together and play. I wrote this book to go beyond the "WEP is bad" headlines and dig a little deeper tounderstand exactly what was happening under the hood and what to do about it.

Organization The journey of How Secure is Your Wireless Network? begins with an introduction to wirelesssecurity including a detailed review of the risks and attacks. Next, we move into a tour of thenative 802.11 security solutions. Finally, we explore a variety of hands-on deploymentsolutions. Here is an overview of each chapter-Chapter 1 is a review of the general wireless landscape. We begin to ask some of the keyquestions that will lay a foundation for the rest of the book. In particular, we look at howsecurity decisions are affected by factors such as deployment size, mobility needs and othersecurity design requirements. We also review SSID broadcasts, MAC filtering, and Shared KeyAuthentication. Chapter 2 starts with a stroll down memory lane as we outline some of the history of the802.11 protocol including 802.11 (1997), Direct Sequence Spread Spectrum (DSSS), and FrequencyHopping Spread Spectrum (FHSS). We take a look at 802.11 a, b and g and some of theirperformance characteristics. Next, we dig deeper into the 802.11 protocol with a review ofarchitecture topologies ("Infrastructure" and "Ad-Hoc" modes) as well as CSMA/CA, RTS/CTS andFragmentation. Chapter 3 is where we jump into a detailed review of WEP and its vulnerabilities. Thisincludes a description and explanation of all known WEP attacks. Chapter 4 describes "War Driving," including all of the hardware, software, tools and techniques so you can understand how to discover Access Points on your own. We include adiscussion of War Chalking and the ethical considerations of War Driving. Chapter 5 discusses 802.11i, WPA, TKIP and AES. In this Chapter, we dig a little deeperinto WEP vulnerabilities and ways in which we can mitigate the risk with newer technologies.This includes a description of new encryption methods such as TKIP, AES and other 802.11igoodies. Chapter 6 follows up on Chapter 5 with a detailed analysis of how 802.1x works, as well asa review of popular EAP types and guidelines to help you choose which one is best for yourparticular situation. Chapter 7 focuses on transitioning between the "under the hood" theme in the first half ofthe book, into the "hands-on" theme of the second half of the book. In this Chapter we discussthe basic security architecture considerations when connecting the WLAN to the wired networkand moving from theory to application. Chapter 8 discusses VPNs, a comparison of various technologies and a step-by-stepdescription of how to implement a Microsoft VPN solution. Chapter 9 talks about securing home environments. It includes a step-by-step guide tobuilding a Linux Embedded Appliance Firewall (LEAF), Sputnik and ReefEdge's Dolphin. Chapter 10 revisits 802.1x and discusses security in an enterprise environment. Thestep-by-step instructions describe how to deploy 802.1x using Microsoft as a Supplicant andAuthentication Server, with a Cisco AP as the Authenticator. In Chapter 11 we review 802.11 in a public hotspot environment. For our step-by-stepproject, we

describe how to build a Linux based AP using HostAP, NoCat and LEAF. Appendix A offers an introdcution to RF. Appendix B discusses various 802.11 frame types.Appendix C gives a detailed overview of community wireless networking. And finally, in AppendixD, you'll find detailed instructions, with illustrations, on how to build a working wirelessantenna out of a cylindrical potato-chip can. Thank you for choosing this book.

HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN PDF

Download: HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN PDF

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken. Thanks for visiting the very best web site that supply hundreds type of book collections. Here, we will present all books How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken that you require. The books from popular writers and also authors are given. So, you could appreciate now to get individually type of publication How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken that you will certainly search. Well, pertaining to the book that you desire, is this How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken your selection? This book How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken is expected to be one of the very best seller book that will certainly make you really feel pleased to get and also review it for finished. As understood could usual, every publication will certainly have certain points that will make a person interested a lot. Also it originates from the author, type, content, and even the author. However, many individuals additionally take the book How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken based upon the motif and also title that make them amazed in. as well as right here, this How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken is quite recommended for you because it has fascinating title and style to review. Are you truly a follower of this How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken If that's so, why don't you take this book currently? Be the very first individual that like and also lead this book How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken, so you could get the factor and also messages from this publication. Never mind to be confused where to get it. As the various other, we share the link to go to and also download and install the soft file ebook How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken So, you could not bring the published book How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken almost everywhere.

HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN PDF

Step-by-step guidelines and best practices show how to deploy secure wireless LANs in an enterprise or home environment and also within community networks. The book explains all 802.11 security solutions and covers WEP, 802.11i, WPA and EAP. ● ● ● ● ● ● ●

Sales Rank: #4839823 in Books Published on: 2003-09-05 Original language: English Number of items: 1 Dimensions: 9.40" h x .60" w x 6.90" l, .98 pounds Binding: Paperback 224 pages

From the Back Cover Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user. Topics covered include-● ● ● ● ● ● ● ● ● ●

Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough

About the Author About the Author LEE BARKEN, CISSP, CCNA, MCP, CPA, has been in the IT industry since 1987. He has worked as anIT consultant and network security specialist for Ernst and Young's Information Technology

RiskManagement (ITRM) practice and KPMG's Risk and Advisory Services (RAS) practice. He cofoundedthe San Diego Wireless Users Group and writes and speaks on the topic of wireless LANtechnology and security. He is the technical editor for Mobile Business Advisor Magazine, andteaches Wireless LAN Security and Deployment classes for the University of California at SanDiego (UCSD) extension.

Excerpt. © Reprinted by permission. All rights reserved. Introduction How Secure is Your Wireless Network? is a book about taking the next step and securing yourwireless network. Announcements by major companies backing wireless technologies are settingthe stage for wide-scale deployments and the ushering in a new era of wireless freedom.Companies like Intel have announced the Centrino chipset that will integrate 802.11functionality into their products. Dell, Gateway, IBM and others have announced initiatives tointegrate wireless technology into their laptops. T-Mobile, Boingo, Wayport and dozens ofothers have deployed hotspots in Starbucks, Borders, and Kinkos locations as well as hotels,airports and other public venues across the world. Almost every University has deployed somekind of wireless initiatives, with high schools and elementary schools following in theirfootsteps. Millions of home users have discovered the joys of wireless networking. Nowbusinesses everywhere are getting on board as well. The bottom line is that wireless is here to stay. The integration of 802.11 into almost allnew laptops and handheld devices, coupled with the explosion in availability of public hotspotshas created a virtuous cycle of large-scale wireless proliferation. This invisible, yetinescapable flood of radio waves has landed squarely in our homes and businesses where itpresents a whole new security challenge. How do we embrace the joys of wireless networks whilewe maintain an essential balance with the security needs of our organization? This book is all about understanding the technology, recognizing the security risks andimplementing a responsible and realistic game plan for safe and secure wireless communication. Why I Wrote This Book Although I had seen many demonstrations of wireless networks, it wasn't until the summer of2001, that I found my true inspiration. At a large security conference, after listening tospeakers talk about community wireless networks, WLAN security and other wireless topics, Icame back home energized and decided it was time to put that spirit to work. A few weeks later,I started the San Diego Wireless Users Group with some friends and found my new passion inwireless technology. With the help of countless dedicated volunteers, including Alan Koebrick,John Eder, Eric Bermel, Michael Mee, and others, we hold monthly meetings with presentations ona variety of topics to share our passion for learning, meet likeminded wireless enthusiasts andhelp one other learn more about this wonderful technology. I've always enjoyed being a "tinkerer," eager to learn how things work.I was the kid who took apart the radio (or telephone, or video game) to check out the parts andunderstand how something operated. Wireless LANs were no different. Fundamentally, if you wantto develop a genuine appreciation for the security risks of wireless networks, you have to rollup your sleeves, get some wireless components together and play. I wrote this book to go beyond the "WEP is bad" headlines and dig a little deeper tounderstand exactly what was happening under the hood and what to do about it.

Organization The journey of How Secure is Your Wireless Network? begins with an introduction to wirelesssecurity including a detailed review of the risks and attacks. Next, we move into a tour of thenative 802.11 security solutions. Finally, we explore a variety of hands-on deploymentsolutions. Here is an overview of each chapter-Chapter 1 is a review of the general wireless landscape. We begin to ask some of the keyquestions that will lay a foundation for the rest of the book. In particular, we look at howsecurity decisions are affected by factors such as deployment size, mobility needs and othersecurity design requirements. We also review SSID broadcasts, MAC filtering, and Shared KeyAuthentication. Chapter 2 starts with a stroll down memory lane as we outline some of the history of the802.11 protocol including 802.11 (1997), Direct Sequence Spread Spectrum (DSSS), and FrequencyHopping Spread Spectrum (FHSS). We take a look at 802.11 a, b and g and some of theirperformance characteristics. Next, we dig deeper into the 802.11 protocol with a review ofarchitecture topologies ("Infrastructure" and "Ad-Hoc" modes) as well as CSMA/CA, RTS/CTS andFragmentation. Chapter 3 is where we jump into a detailed review of WEP and its vulnerabilities. Thisincludes a description and explanation of all known WEP attacks. Chapter 4 describes "War Driving," including all of the hardware, software, tools and techniques so you can understand how to discover Access Points on your own. We include adiscussion of War Chalking and the ethical considerations of War Driving. Chapter 5 discusses 802.11i, WPA, TKIP and AES. In this Chapter, we dig a little deeperinto WEP vulnerabilities and ways in which we can mitigate the risk with newer technologies.This includes a description of new encryption methods such as TKIP, AES and other 802.11igoodies. Chapter 6 follows up on Chapter 5 with a detailed analysis of how 802.1x works, as well asa review of popular EAP types and guidelines to help you choose which one is best for yourparticular situation. Chapter 7 focuses on transitioning between the "under the hood" theme in the first half ofthe book, into the "hands-on" theme of the second half of the book. In this Chapter we discussthe basic security architecture considerations when connecting the WLAN to the wired networkand moving from theory to application. Chapter 8 discusses VPNs, a comparison of various technologies and a step-by-stepdescription of how to implement a Microsoft VPN solution. Chapter 9 talks about securing home environments. It includes a step-by-step guide tobuilding a Linux Embedded Appliance Firewall (LEAF), Sputnik and ReefEdge's Dolphin. Chapter 10 revisits 802.1x and discusses security in an enterprise environment. Thestep-by-step instructions describe how to deploy 802.1x using Microsoft as a Supplicant andAuthentication Server, with a Cisco AP as the Authenticator. In Chapter 11 we review 802.11 in a public hotspot environment. For our step-by-stepproject, we

describe how to build a Linux based AP using HostAP, NoCat and LEAF. Appendix A offers an introdcution to RF. Appendix B discusses various 802.11 frame types.Appendix C gives a detailed overview of community wireless networking. And finally, in AppendixD, you'll find detailed instructions, with illustrations, on how to build a working wirelessantenna out of a cylindrical potato-chip can. Thank you for choosing this book.

Most helpful customer reviews 4 of 4 people found the following review helpful. Even easy for beginners to understand! By John Berger I have 24 network jacks in my house. I don't want to install another network jack ever. Wireless is the answer from this point. The biggest problem with wireless is evident: security. This is one of numerous books on wireless security. Fortunately, it's a well done book that is not meant to be read by rocket scientists. You know those kinds of books: written by ego-centric techie-geeks who pad their books with technical jargon and useless scientific theory that only people at MIT could understand. Instead, this book is relatively easy to understand as long as you have some knowledge on wireless technology (beyond the fact that there are no wires involved). One chapter that I found to be very interesting covers the concept of war driving, which is the equivalent of driving around to pick up wireless networks in a neighborhood. It also covers how war drivers leave chalk identification markers for other war drivers to know that a wireless network has been detected. The book also adequately covers the various types of authentication and encryption that can be used help to secure a wireless network. Once again, the very technical details about how the packets are designed and how the handshaking takes place tends to be a bit dry to those without much technical experience. Using Windows 2000 Server as the example, the book goes through all of the steps necessary (with a large number of screen shots) to implement a VPN as well as set up an authentication and certificate server for enterprises. Fortunately, the home user is not forgotten. An entire chapter is dedicated to securing and managing a home wireless network; however, all of the home security methods that are covered in this book are Linux-based. Of course, if you're concerned about security, why are you thinking of using Windows in the first place? The appendices have a lot of background information on radio frequency and antennae types. But the really geeky appendix is how to make a functional wireless antenna out of a Pringles potato chip can. Overall, this is a good book to have. Obviously, computer technology being what it is means that the book will be obsolete in relatively short order. However, the fact that this book doesn't adhere to the mindless Windows centricity of most books of this kind also helps to give it that little boost of extra value. I also like this book because it does not have the "I have a master degree so I'm going to speak like I'm addressing only brilliant people so as to impress you and add pages to the book to make it seem more important than it is" attitude. Yes, you should to have a grasp of some of the concepts behind networking protocols to understand this; but the majority of the book is not a difficult read. If you're thinking of implementing a wireless network, this is a good book to have at your side. 2 of 2 people found the following review helpful.

Thin but full of good info By Dr Anton Chuvakin Not being a wireless security expert, I liked this book for a concise intro to wireless technology as well as wireless security. This relatively thin book provides balanced (in my opinion) coverage of attacks and defenses, enterprise and home. It deals well with high-level and low-level topics (such as various configuration settings). It also described both UNIX/Linux and Windows configuration options and solutions. For example, detailed guidelines for setting up a public hotspot with Linux are provided. The book mixes the wireless technology details with relevant security issues in a single coherent story. It is easy to read and well-written. Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a major information security company. His areas of infosec expertise include intrusion detection, UNIX security, forensics, honeypots, etc. In his spare time, he maintains his security portal info-secure.org 1 of 1 people found the following review helpful. Wi-Fi Concepts and Security Techniques Most Can Understand By sixmonkeyjungle Wireless networks are popping up everywhere. They are hot for home users and for corporations. They are springing up in coffee shops and book stores. But, anyone can intercept those airwaves so you need to be sure that you know how to secure your wireless network and protect your network and your computers from prying eyes. How Secure Is Your Wireless Network? provides detailed coverage of the available wireless protocols and the pitfalls of each (like interference with common household devices such as cordless phones and baby monitors). This book is a very good resource, but may be a little too technical for the non-computer gurus. Barken does a good job of explaining most of the concepts and steps in relatively plain English though. (...) See all 6 customer reviews...

HOW SECURE IS YOUR WIRELESS NETWORK? SAFEGUARDING YOUR WI-FI LAN BY LEE BARKEN PDF

The presence of the on the internet book or soft data of the How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken will alleviate individuals to get the book. It will certainly additionally save more time to only search the title or author or author to obtain until your publication How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken is disclosed. After that, you can visit the link download to check out that is provided by this site. So, this will certainly be a very good time to start enjoying this publication How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken to check out. Always good time with publication How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken, always great time with cash to spend! From the Back Cover Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user. Topics covered include-● ● ● ● ● ● ● ● ● ●

Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough

About the Author About the Author LEE BARKEN, CISSP, CCNA, MCP, CPA, has been in the IT industry since 1987. He has worked as anIT consultant and network security specialist for Ernst and Young's Information Technology RiskManagement (ITRM) practice and KPMG's Risk and Advisory Services (RAS) practice. He cofoundedthe San Diego Wireless Users Group and writes and speaks on the topic of wireless LANtechnology and security. He is the technical editor for Mobile Business Advisor Magazine,

andteaches Wireless LAN Security and Deployment classes for the University of California at SanDiego (UCSD) extension.

Excerpt. © Reprinted by permission. All rights reserved. Introduction How Secure is Your Wireless Network? is a book about taking the next step and securing yourwireless network. Announcements by major companies backing wireless technologies are settingthe stage for wide-scale deployments and the ushering in a new era of wireless freedom.Companies like Intel have announced the Centrino chipset that will integrate 802.11functionality into their products. Dell, Gateway, IBM and others have announced initiatives tointegrate wireless technology into their laptops. T-Mobile, Boingo, Wayport and dozens ofothers have deployed hotspots in Starbucks, Borders, and Kinkos locations as well as hotels,airports and other public venues across the world. Almost every University has deployed somekind of wireless initiatives, with high schools and elementary schools following in theirfootsteps. Millions of home users have discovered the joys of wireless networking. Nowbusinesses everywhere are getting on board as well. The bottom line is that wireless is here to stay. The integration of 802.11 into almost allnew laptops and handheld devices, coupled with the explosion in availability of public hotspotshas created a virtuous cycle of large-scale wireless proliferation. This invisible, yetinescapable flood of radio waves has landed squarely in our homes and businesses where itpresents a whole new security challenge. How do we embrace the joys of wireless networks whilewe maintain an essential balance with the security needs of our organization? This book is all about understanding the technology, recognizing the security risks andimplementing a responsible and realistic game plan for safe and secure wireless communication. Why I Wrote This Book Although I had seen many demonstrations of wireless networks, it wasn't until the summer of2001, that I found my true inspiration. At a large security conference, after listening tospeakers talk about community wireless networks, WLAN security and other wireless topics, Icame back home energized and decided it was time to put that spirit to work. A few weeks later,I started the San Diego Wireless Users Group with some friends and found my new passion inwireless technology. With the help of countless dedicated volunteers, including Alan Koebrick,John Eder, Eric Bermel, Michael Mee, and others, we hold monthly meetings with presentations ona variety of topics to share our passion for learning, meet likeminded wireless enthusiasts andhelp one other learn more about this wonderful technology. I've always enjoyed being a "tinkerer," eager to learn how things work.I was the kid who took apart the radio (or telephone, or video game) to check out the parts andunderstand how something operated. Wireless LANs were no different. Fundamentally, if you wantto develop a genuine appreciation for the security risks of wireless networks, you have to rollup your sleeves, get some wireless components together and play. I wrote this book to go beyond the "WEP is bad" headlines and dig a little deeper tounderstand exactly what was happening under the hood and what to do about it. Organization

The journey of How Secure is Your Wireless Network? begins with an introduction to wirelesssecurity including a detailed review of the risks and attacks. Next, we move into a tour of thenative 802.11 security solutions. Finally, we explore a variety of hands-on deploymentsolutions. Here is an overview of each chapter-Chapter 1 is a review of the general wireless landscape. We begin to ask some of the keyquestions that will lay a foundation for the rest of the book. In particular, we look at howsecurity decisions are affected by factors such as deployment size, mobility needs and othersecurity design requirements. We also review SSID broadcasts, MAC filtering, and Shared KeyAuthentication. Chapter 2 starts with a stroll down memory lane as we outline some of the history of the802.11 protocol including 802.11 (1997), Direct Sequence Spread Spectrum (DSSS), and FrequencyHopping Spread Spectrum (FHSS). We take a look at 802.11 a, b and g and some of theirperformance characteristics. Next, we dig deeper into the 802.11 protocol with a review ofarchitecture topologies ("Infrastructure" and "Ad-Hoc" modes) as well as CSMA/CA, RTS/CTS andFragmentation. Chapter 3 is where we jump into a detailed review of WEP and its vulnerabilities. Thisincludes a description and explanation of all known WEP attacks. Chapter 4 describes "War Driving," including all of the hardware, software, tools and techniques so you can understand how to discover Access Points on your own. We include adiscussion of War Chalking and the ethical considerations of War Driving. Chapter 5 discusses 802.11i, WPA, TKIP and AES. In this Chapter, we dig a little deeperinto WEP vulnerabilities and ways in which we can mitigate the risk with newer technologies.This includes a description of new encryption methods such as TKIP, AES and other 802.11igoodies. Chapter 6 follows up on Chapter 5 with a detailed analysis of how 802.1x works, as well asa review of popular EAP types and guidelines to help you choose which one is best for yourparticular situation. Chapter 7 focuses on transitioning between the "under the hood" theme in the first half ofthe book, into the "hands-on" theme of the second half of the book. In this Chapter we discussthe basic security architecture considerations when connecting the WLAN to the wired networkand moving from theory to application. Chapter 8 discusses VPNs, a comparison of various technologies and a step-by-stepdescription of how to implement a Microsoft VPN solution. Chapter 9 talks about securing home environments. It includes a step-by-step guide tobuilding a Linux Embedded Appliance Firewall (LEAF), Sputnik and ReefEdge's Dolphin. Chapter 10 revisits 802.1x and discusses security in an enterprise environment. Thestep-by-step instructions describe how to deploy 802.1x using Microsoft as a Supplicant andAuthentication Server, with a Cisco AP as the Authenticator. In Chapter 11 we review 802.11 in a public hotspot environment. For our step-by-stepproject, we describe how to build a Linux based AP using HostAP, NoCat and LEAF.

Appendix A offers an introdcution to RF. Appendix B discusses various 802.11 frame types.Appendix C gives a detailed overview of community wireless networking. And finally, in AppendixD, you'll find detailed instructions, with illustrations, on how to build a working wirelessantenna out of a cylindrical potato-chip can. Thank you for choosing this book.

Exactly how a suggestion can be got? By staring at the celebrities? By going to the sea and also checking out the sea weaves? Or by reading a publication How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken Everybody will certainly have particular unique to get the motivation. For you which are dying of books and consistently obtain the motivations from publications, it is really excellent to be below. We will certainly reveal you hundreds compilations of the book How Secure Is Your Wireless Network? Safeguarding Your WiFi LAN By Lee Barken to check out. If you similar to this How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN By Lee Barken, you could also take it as all yours.

pdf-0751\how-secure-is-your-wireless-network ...

Try one of the apps below to open or edit this item. pdf-0751\how-secure-is-your-wireless-network-safeguarding-your-wi-fi-lan-by-lee-barken.pdf.

91KB Sizes 4 Downloads 188 Views

Recommend Documents

No documents